CN108322366A - Access the methods, devices and systems of network - Google Patents

Access the methods, devices and systems of network Download PDF

Info

Publication number
CN108322366A
CN108322366A CN201710031638.5A CN201710031638A CN108322366A CN 108322366 A CN108322366 A CN 108322366A CN 201710031638 A CN201710031638 A CN 201710031638A CN 108322366 A CN108322366 A CN 108322366A
Authority
CN
China
Prior art keywords
access
terminal
network
virtual private
private network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710031638.5A
Other languages
Chinese (zh)
Other versions
CN108322366B (en
Inventor
王青华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201710031638.5A priority Critical patent/CN108322366B/en
Publication of CN108322366A publication Critical patent/CN108322366A/en
Application granted granted Critical
Publication of CN108322366B publication Critical patent/CN108322366B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention discloses a kind of methods, devices and systems of access network.Wherein, which includes:Terminal and server, wherein, terminal, for determining that data connection to be visited needs to connect Virtual Private Network, data to be visited are verified by default verification mode, and access request is sent to server, wherein whether the authentication information that prestores that default verification mode is used to verify terminal meets the standard of access server according to verification result;Network belonging to server is Virtual Private Network;Server is connect with terminal, the access request for receiving terminal transmission, and according to access request by the Virtual Private Network belonging to terminal access server.The present invention is solved due to the low technical problem of logging in VPN is brought in the prior art login efficiency.

Description

Access the methods, devices and systems of network
Technical field
The present invention relates to application of net fields, in particular to a kind of method, apparatus accessing network and are System.
Background technology
With the extensive utilization of cloud office technology, user access virtual dedicated network (Virtual Private Network, abbreviation VPN) become a kind of common working way, which is advantageous in that, on one computer As long as the computing capability of computer disclosure satisfy that virtual machine calculates demand, so that it may to realize multi-platform do on one computer Public affairs, and cloud office also provides significant contribution in information security issue, that is, the action or virtual completed on virtual machine The consortium's inside information stored on machine is not stored on local computer, will not because of the copy in local computer, It is involved in the problems, such as information-leakage.
User is generally required in the mode of existing logging in VPN voluntarily to dial in by VPN, and by cipher token come complete At certification, then VPN is disconnected by actively disconnecting the means such as VPN or computer shutdown suspend mode.
And to show as login process cumbersome for the major defect of subscriber dialing VPN access company Intranet, need login account and Password, and wait for and being verified.
For the above-mentioned problem low due to the login efficiency that logging in VPN is brought in the prior art, not yet propose at present effective Solution.
Invention content
An embodiment of the present invention provides a kind of methods, devices and systems of access network, at least to solve due to existing skill The low technical problem of logging in VPN is brought in art login efficiency.
One side according to the ... of the embodiment of the present invention provides a kind of system of access network, including:Terminal and service Device, wherein terminal is verified for determining that data connection to be visited needs to connect Virtual Private Network by default verification mode Data to be visited, and according to verification result access request is sent to server, wherein default verification mode is for verifying terminal Whether the authentication information that prestores meets the standard of access server;Network belonging to server is Virtual Private Network;Service Device is connect with terminal, the access request for receiving terminal transmission, and will be belonging to terminal access server according to access request Virtual Private Network.
Optionally, terminal includes:First terminal and second terminal, wherein first terminal, for determining that data to be visited connect It connects and needs to connect the Internet resources in Virtual Private Network;And send access authentication request to second terminal, wherein access authentication Request is used to indicate second terminal according to the authentication information that prestores in access authentication request, judges whether to confirm first eventually Hold access virtual private network;The authentication information that prestores includes:Verify certificate;Second terminal is connect with first terminal, is used for Access authentication request is received, and detects whether verification certificate matches with the verification signaling of access virtual private network;It is tied in detection Fruit is to return to access confirmation message to first terminal in the case of being, so that first terminal foundation accesses confirmation message to clothes Business device sends access request.
Further, optionally, verification certificate includes:Account and password, account and password are for logging in Virtual Private Network Network.
Optionally, first terminal includes:Custom system and checking system, wherein checking system, for detecting custom system In data to be visited whether connect the Internet resources in Virtual Private Network;And send prompt message to custom system, wherein carry Show information be used to indicate custom system whether access virtual private network;Custom system is connect with checking system, is carried for receiving Show information, and is returned according to prompt message and confirm access information;Checking system is additionally operable to according to the confirmation access letter received Breath sends access authentication request to second terminal.
Optionally, first terminal is additionally operable to after access virtual private network, in preset time section, is detected whether Whether judge current sensing time in the case where testing result is no in the presence of the operation to Virtual Private Network request data More than or equal to the upper limit threshold in preset time section, in the case where the judgment result is yes, sent to Virtual Private Network disconnected Open connection request, wherein disconnect request, be used to indicate the chain that server disconnects first terminal access virtual private network Road.
Optionally, second terminal includes:Mobile terminal;Wherein, mobile terminal is asked for receiving access authentication, and according to The verification array to prestore in the verification certificate and mobile terminal that are carried in being asked according to access authentication is verified, and is being proved to be successful In the case of, return to access confirmation message to first terminal.
Optionally, server is additionally operable to receive the request that disconnects of first terminal transmission, and is asked according to open circuit connection It asks, cuts off first terminal access virtual private network.
Other side according to the ... of the embodiment of the present invention provides a kind of method of access network, including:First terminal is true Fixed data connection to be visited needs to access Virtual Private Network;First terminal sends access authentication request to second terminal, In, access authentication request, the identity that prestores for being used to indicate second terminal according to the first terminal carried in access authentication request is tested Information is demonstrate,proved, judges whether to confirm first terminal access virtual private network;First terminal receives second terminal according to access authentication Ask the access confirmation message returned;First terminal is according to the Virtual Private Network belonging to access confirmation message access server.
Optionally, first terminal determines that data connection to be visited needs to access Virtual Private Network to include:First terminal The data of current accessed are parsed, obtain the target access information in data, wherein target access information includes:Path address, mutually At least one of the access identities carried in networking protocol address or data;First terminal is by target access information and prestores visit It asks that data list is matched, judges whether target access information accesses access virtual private network in data list with prestoring Mark matching.
Further, optionally, first terminal judge target access information whether with prestore access data list in connect After the mark matching for entering Virtual Private Network, first terminal sends access authentication request to second terminal and includes:Judging to tie Fruit is first terminal display reminding information, wherein prompt message is used to indicate user, and whether access of virtual is special in the case of being Network;First terminal, which receives, confirms incoming instruction, wherein confirms incoming instruction, is used to indicate first terminal and confirms access of virtual Dedicated network;First terminal sends access authentication request according to confirmation incoming instruction to second terminal.
Optionally, first terminal includes according to the Virtual Private Network belonging to access confirmation message access server:It is connecing In the case of entering the verification signaling that confirmation message carries second terminal, first terminal is according to verification signaling and the authentication letter that prestores Breath generates access request;First terminal sends access request to server.
Further, optionally, the authentication information that prestores includes:Verify certificate, wherein verifying certificate includes:Account And password, account and password are for logging in Virtual Private Network.
Optionally, this method further includes:After first terminal access virtual private network, in preset time section, First terminal detects whether the operation for having to Virtual Private Network request data;In the case where testing result is no, first Terminal judges whether current sensing time is greater than or equal to the upper limit threshold in preset time section;The case where judging result is to be Under, first terminal disconnects request to Virtual Private Network transmission, wherein disconnects request, it is disconnected to be used to indicate server Open the link of first terminal access virtual private network.
Other side according to the ... of the embodiment of the present invention, the method for providing another access network, including:Second terminal Receive the access authentication request that first terminal is sent;Second terminal prestores according to the first terminal carried in access authentication request Authentication information judges whether to confirm first terminal access virtual private network;In the case where the judgment result is yes, second Terminal sends access confirmation message to first terminal.
Optionally, prestore authentication information of the second terminal according to the first terminal carried in access authentication request, sentences It is disconnected whether to confirm that first terminal access virtual private network includes:First carried in second terminal parsing access authentication request is eventually The authentication information that prestores at end, the verification certificate in the identity information that obtains prestoring, wherein verification certificate includes:Account and close Code, account and password are for logging in Virtual Private Network;Second terminal detection verification certificate whether with access virtual private network Verification signaling matching, wherein verification signaling be second terminal in pre-stored verification array.
Other side according to the ... of the embodiment of the present invention, the method for providing another access network, including:Server connects Receive the access request that first terminal is sent;Server is according to access request by the virtual private belonging to first terminal access server Network.
Optionally, the Virtual Private Network belonging to first terminal access server is included by server according to access request: Access request is parsed, the verification of prestore authentication information and the second terminal of the first terminal carried in access request is obtained Signaling;It verifies and prestores authentication information and verify whether signaling meets default access standard;The case where check results are to be Under, server is by the Virtual Private Network belonging to first terminal access server.
Optionally, this method further includes:Receive first terminal transmission disconnects request;And it is asked according to open circuit connection It asks, cuts off first terminal access virtual private network.
Other side according to the ... of the embodiment of the present invention, the method for providing another access network, including:Detect user Whether data to be visited connect the Internet resources in Virtual Private Network in system;In the case where testing result is to be, Xiang Yong Family system sends prompt message, wherein prompt message be used to indicate custom system whether access virtual private network;According to reception The confirmation access information that the custom system arrived returns sends access authentication request to second terminal.
Another aspect according to the ... of the embodiment of the present invention provides a kind of method of access network, including:Receive examination system The prompt message that system is sent;It is returned according to prompt message and confirms access information.
One side according to the ... of the embodiment of the present invention provides a kind of device of access network, including:First detection mould Block, for determining that data connection to be visited needs to access Virtual Private Network;First sending module, for being sent out to second terminal Access authentication is sent to ask, wherein access authentication is asked, and is used to indicate second terminal according to first carried in access authentication request The authentication information that prestores of terminal judges whether to confirm first terminal access virtual private network;First receiving module, is used for Receive the access confirmation message that second terminal is returned according to access authentication request;First AM access module, for confirming according to access Virtual Private Network belonging to information access server.
One side according to the ... of the embodiment of the present invention provides the device of another access network, including:Second receives mould Block, the access authentication request for receiving first terminal transmission;First authentication module, for being carried in being asked according to access authentication First terminal the authentication information that prestores, judge whether confirm first terminal access virtual private network;Second sends mould Block, in the case where the judgment result is yes, access confirmation message being sent to first terminal.
Another aspect according to the ... of the embodiment of the present invention provides a kind of Intelligent hardware, including:Transmitter/receivers, processor, Memory and display screen, wherein transmitter/receivers, the access authentication request for receiving first terminal transmission;Processor, and transmits/receives Device connects, for according to the authentication information that prestores of first terminal carried in access authentication request, judging whether confirmation the One terminal for accessing virtual dedicated network, wherein processor is by calling the verification signaling stored in memory to judge whether to confirm First terminal access virtual private network, and judging result is shown by display screen;Transmitter/receivers, be additionally operable to be in judging result In the case of being, access confirmation message is sent to first terminal.
One side according to the ... of the embodiment of the present invention provides the device of another access network, including:Third receives mould Block, the access request for receiving first terminal transmission;Second AM access module, for accessing first terminal according to access request Virtual Private Network belonging to server.
One side according to the ... of the embodiment of the present invention provides the device of another access network, including:Second detection mould Block, for detecting whether data to be visited in custom system connect Internet resources in Virtual Private Network;Third sending module, For in the case where testing result is to be, prompt message to be sent to custom system, wherein prompt message is used to indicate user system System whether access virtual private network;4th sending module, the confirmation access information that the custom system that foundation receives returns, to Second terminal sends access authentication request.
Other side according to the ... of the embodiment of the present invention provides a kind of device of access network, including:4th receives mould Block, the prompt message for receiving checking system transmission;5th sending module confirms access letter for being returned according to prompt message Breath.
In embodiments of the present invention, pass through terminal and server, wherein terminal, for determining that data connection to be visited needs Virtual Private Network is connected, data to be visited are verified by default verification mode, and sent to server according to verification result Access request, wherein whether the authentication information that prestores that default verification mode is used to verify terminal meets access server Standard;Network belonging to server is Virtual Private Network;Server is connect with terminal, the access for receiving terminal transmission Request, and according to access request by the Virtual Private Network belonging to terminal access server, reached the mesh without password login VPN , the technique effect for logging in efficiency is promoted to realize, and then solve due to the login that logging in VPN is brought in the prior art The low technical problem of efficiency.
Description of the drawings
Attached drawing described herein is used to provide further understanding of the present invention, and is constituted part of this application, this hair Bright illustrative embodiments and their description are not constituted improper limitations of the present invention for explaining the present invention.In the accompanying drawings:
Fig. 1 is the structural schematic diagram of the system of middle access network according to embodiments of the present invention;
Fig. 2 be according to embodiments of the present invention in it is a kind of access network system in first terminal access server belonging network Flow interaction figure;
Fig. 3 is the affiliated net of first terminal access server in the middle another system for accessing network according to embodiments of the present invention The flow interaction figure of network;
Fig. 4 be according to embodiments of the present invention in another access network system in first terminal from server belonging network The flow interaction figure of disconnection;
Fig. 5 be according to embodiments of the present invention in a kind of method for realizing access network terminal it is (or mobile Equipment) hardware block diagram;
Fig. 6 is the flow chart of the method for according to embodiments of the present invention two access network;
Fig. 7 is the flow chart of the method for according to embodiments of the present invention three access network;
Fig. 8 is the flow chart of the method for according to embodiments of the present invention four access network;
Fig. 9 is the flow chart of the method for according to embodiments of the present invention five access network;
Figure 10 is the flow chart of the method for according to embodiments of the present invention six access network;
Figure 11 is the structural schematic diagram of the device of according to embodiments of the present invention seven access network;
Figure 12 is the structural schematic diagram of the device of according to embodiments of the present invention eight access network;
Figure 13 is the structural schematic diagram of the device of according to embodiments of the present invention ten access network;
Figure 14 is the structural schematic diagram of the device of according to embodiments of the present invention 11 access network;
Figure 15 is the structural schematic diagram of the device of according to embodiments of the present invention 12 access network.
Specific implementation mode
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The every other embodiment that member is obtained without making creative work should all belong to the model that the present invention protects It encloses.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, " Two " etc. be for distinguishing similar object, without being used to describe specific sequence or precedence.It should be appreciated that using in this way Data can be interchanged in the appropriate case, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover It includes to be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment to cover non-exclusive Those of clearly list step or unit, but may include not listing clearly or for these processes, method, product Or the other steps or unit that equipment is intrinsic.
First, the part noun or term occurred during the embodiment of the present application is described is suitable for following solution It releases:
Virtual Private Network:Virtual Private Network, abbreviation VPN.
Embodiment 1
According to the application one embodiment, a kind of system embodiment of access network is provided, Fig. 1 is according to of the invention real Apply the structural schematic diagram for the system that network is accessed in example.
As shown in Figure 1, the system of the access network includes:Terminal 12 and server 14, wherein
Terminal 12, for being used to determine that data connection to be visited to need to connect Virtual Private Network, by presetting authentication Formula verifies data to be visited, and sends access request to server 14 according to verification result, wherein default verification mode is for testing Whether the authentication information that prestores of card terminal 12 meets the standard of access server 14;Network belonging to server 14 is virtual Dedicated network;Server 14 is connect with terminal 12, the access request for receiving the transmission of terminal 12, and will according to access request Virtual Private Network belonging to 12 access server 14 of terminal.
Specifically, in the system of access network provided in this embodiment, terminal 12 detects whether data to be visited connect void Internet resources in quasi- dedicated network, wherein the Internet resources may include:The IP address connected in data to be visited is corresponding File, corresponding application program or corresponding file;For example, the corresponding hyperlink of list in the text that present terminal 12 is opened The detailed data in the correspondence IP address in corresponding VPN network is connect, when detecting that the list in the text corresponds in the VPN network Detailed data when, terminal 12 to server 14 send access request, wherein the access request carries the pre- of terminal 12 and takes shelter Part verification information accesses the terminal 12 in the case where verifying the identity information that prestores and meeting the standard of access server 14 Virtual private network belonging to the server 14, that is, in order to avoid the mode of close input accesses VPN network, saved input and logged in account Number, password and waiting system verification time, improve the efficiency handled official business into VPN network.
In the system of access network provided by the embodiments of the present application, pass through terminal and server, wherein terminal, for true Fixed data connection to be visited needs to connect Virtual Private Network, verifies data to be visited by default verification mode, and foundation is tested It demonstrate,proves result and sends access request to server, wherein presetting prestore authentication information of the verification mode for verifying terminal is The no standard for meeting access server;Network belonging to server is Virtual Private Network;Server is connect with terminal, is used for The access request that terminal is sent is received, and reaches the Virtual Private Network belonging to terminal access server according to access request Purpose without password login VPN promotes the technique effect for logging in efficiency to realize, and then solves due to the prior art The low technical problem of login efficiency that middle logging in VPN is brought.
Function in the system of access network provided by the embodiments of the present application in terminal 12 can pass through two ways reality It is existing, it is as shown in Figures 2 and 3, specific as follows:
Scheme one:
Optionally, Fig. 2 be according to embodiments of the present invention in it is a kind of access network system in first terminal access server The flow interaction figure of belonging network, as shown in Fig. 2, terminal 12 includes:First terminal 121 and second terminal 122, wherein
First terminal 121, for determining that data connection to be visited needs to connect the Internet resources in Virtual Private Network;And Access authentication request is sent to second terminal 122, wherein access authentication is asked, and is used to indicate second terminal 122 and is recognized according to access The authentication information that prestores in card request judges whether to confirm 121 access virtual private network of first terminal;The identity that prestores is tested Demonstrate,proving information includes:Verify certificate;
Second terminal 122 is connect with first terminal 121, for receiving access authentication request, and whether detects verification certificate It is matched with the verification signaling of access virtual private network;In the case where testing result is to be, returns and access to first terminal 121 Confirmation message, so that first terminal 121 sends access request according to access confirmation message to server 14.
Wherein, whether second terminal 122 with the verification signaling of access virtual private network matches it in detection verification certificate Before, second terminal 122 receives the verification signaling that server 14 is sent, and the verification signaling can pass through the form of handset token here It is sent to second terminal 122, wherein verification signaling is corresponding with the verification certificate that first terminal 121 prestores, that is, works as first terminal Carry verification certificate in the 121 access authentications requests sent to second terminal 122, second terminal 122 and the verification certificate and Verification signaling matches, and when successful match, surface first terminal 121 is proved to be successful.
Further, optionally, verification certificate includes:Account and password, account and password are for logging in Virtual Private Network Network.
Specifically, as shown in Fig. 2, the function in the system of access network provided in this embodiment in terminal 12 can divide It is realized for two terminals, that is, above-mentioned first terminal 121 and second terminal 122, wherein first terminal 121 and second terminal 122 Can be mobile terminal, which may include:Smart mobile phone (such as current application Android android system or IOS systems Mobile phone, or the mobile phone of VPN network may be logged in), tablet computer, laptop, desktop computer, palm commercial affairs, intelligence wear Equipment is worn (for example, enhancing virtual reality AR equipment (Augmented Reality), such as:Google glass, smartwatch etc. can Network is accessed, the wearable device of VPN network is logged in).
First terminal 121 is with laptop or desktop computer in the system of access network provided in this embodiment Example, by taking smart mobile phone as an example, Virtual Private Network is referred to as VPN network and illustrates second terminal 122, when user uses computer When opening random procedure, run on the system detectio of current computer to the data storage location that the program connects be VPN network, this When to smart mobile phone send access authentication request, access authentication request is to carry the request of default authentication information to disappear Breath, wherein the authentication information that prestores includes:Certificate is verified, which can be that corresponding VPN network is installed on currently The safety certificate of computer distribution, smart mobile phone are carried out according to the safety certificate and verification signaling in the VPN client of computer Matching sends access confirmation message in the case of successful match to computer.
Wherein, smart mobile phone is matched according to the safety certificate with verification signaling, in the case of successful match, to electricity Manifestation mode on smart mobile phone can be during brain sends access confirmation message:In data processing level, intelligence Mobile phone is matched according to the safety certificate in access authentication request with the verification signaling on smart mobile phone, alternatively, receiving computer The access authentication of transmission is asked, according to the verification certificate in the verification token authentication access authentication request on smart mobile phone;Aobvious Show, after smart mobile phone receives the access authentication request of computer transmission, whether smart mobile phone display reminding information, display " connects Enter VPN network" in the case where user selects to confirm, access confirmation message is returned into computer, and then computer accesses VPN network.
What needs to be explained here is that the verification process on smart mobile phone can be enabled by an application APP with mobile phone The access authentication request that the formal verification computer of board is sent, wherein the handset token can be a random array, for verifying The access authentication is asked, and the application does not limit the process for the access authentication request that smart mobile phone verification computer is sent, to realize this Subject to the system for applying for the access network that embodiment provides, do not limit specifically.
Wherein, when first terminal 121 is tablet computer or smart mobile phone, realization method is identical as computer realization method, Difference lies according to the corresponding VPN client of different terminals type installation, do not repeat specifically.
Scheme two:
Optionally, first terminal access service in the system of another access network during Fig. 3 is according to embodiments of the present invention The flow interaction figure of device belonging network, as shown in figure 3, first terminal 121 includes:Custom system 1211 and checking system 1212, Wherein,
Checking system 1212, for being used to detect whether data to be visited in custom system 1211 to connect Virtual Private Network In Internet resources;And send prompt message to custom system 1211, wherein prompt message, which is used to indicate custom system 1211, is No access virtual private network;
Custom system 1211 is connect with checking system 1212, is returned really for receiving prompt message, and according to prompt message Recognize access information;
Checking system 1212, is additionally operable to according to the confirmation access information received, and access authentication is sent to second terminal 122 Request.
Specifically, as shown in figure 3, be different from scheme one, in scheme two in first terminal 121, pass through custom system 1211 and checking system 1212 execute corresponding function respectively, for example, custom system 1211 open A apply (or A texts), In, checking system 1212 detects that the source data in A applications is mapped in the Internet resources in VPN network, needs to access VPN nets Network, thus checking system 1212 to custom system 1211 send prompt message, custom system 1211 show the prompt message and by To the instruction for confirming access, custom system 1211 is generated according to the instruction confirms access information, and checking system 1212 is true according to this Recognize access information, the confirmation access information is sent to second terminal 122, so that the secondary verification by second terminal 122, VPN network belonging to access server 14.
Optionally, during Fig. 4 is according to embodiments of the present invention in the system of another access network first terminal from server The flow interaction figure that belonging network disconnects, as shown in figure 4, first terminal 121 is additionally operable to after access virtual private network, In preset time section, detection first terminal 121 is with the presence or absence of the operation to Virtual Private Network request data, in testing result In the case of no, judge whether current sensing time is greater than or equal to the upper limit threshold in preset time section, in judging result In the case of being, request is disconnected to Virtual Private Network transmission, wherein disconnect request, be used to indicate server 14 disconnect the link of 121 access virtual private network of first terminal.
Specifically, as shown in figure 4, after first terminal 121 accesses VPN network, first terminal 121 enters similar " prison Listen " pattern, wherein setting preset time section, that is, if not detecting first terminal 121 in the preset time section Operation to Virtual Private Network request data will send to Virtual Private Network and disconnect request, so that server 14 Disconnect the link of 121 access virtual private network of first terminal.
Optionally, second terminal 122 includes:Mobile terminal;Wherein, mobile terminal, for receiving access authentication request, and Verified according to the verification array to prestore in the verification certificate and mobile terminal that carry in access authentication request, verify at In the case of work(, access confirmation message is returned to first terminal 121.
Specifically, as shown in Figures 2 and 3, second terminal 122 can be mobile terminal, be connect by the mobile terminal Enter certification request, and the verification array to prestore in the verification certificate and mobile terminal carried in being asked according to access authentication carries out Verification returns to access confirmation message in the case where being proved to be successful to first terminal 121.
Optionally, as shown in figure 4, server 14, is additionally operable to receive the request that disconnects of the transmission of first terminal 121, and According to breaking connection request, 121 access virtual private network of first terminal is cut off.
Specifically, as shown in figure 4, after the transmission of first terminal 121 disconnects request, server 14 receives the disconnection and connects Request is connect, and request is disconnected according to this, cuts off 121 access virtual private network of first terminal.
In addition, after first terminal 121 and VPN network disconnect, if user needs again to access first terminal 121 VPN, then execute re-execute 121 certification of above-mentioned first terminal and first terminal 121 carried out by second terminal 122 it is secondary After certification, access request, and the process of the VPN belonging to access server 14 are sent to server 14.
The system of access network provided in this embodiment can make user exempt from close high safety to automatically access company Intranet method, When user actively accesses Intranet resource, actively prompt the user whether to need to access Intranet, if the user determine that needing in access Net, then can push a notice to the token mobile phone of user's registration carries out secondary-confirmation, carrying out VPN on backstage later dials in, Entire access procedure is fully transparent, unaware for a user.After user's access network-free network demand several minutes, Intranet connection is actively disconnected, has ensured the information security in VPN network.
Embodiment 2
According to another embodiment of the present invention, a kind of embodiment of the method for access network is additionally provided, it should be noted that The step of flow of attached drawing illustrates can execute in the computer system of such as a group of computer-executable instructions, also, It, in some cases, can be with different from shown in sequence execution herein although logical order is shown in flow charts The step of going out or describing.
The embodiment of the method that the embodiment of the present application one is provided can be in mobile terminal, terminal or similar fortune It calculates and is executed in device.Fig. 5 be according to embodiments of the present invention in it is a kind of for realizing access network method terminal (or Mobile device) hardware block diagram.As shown in figure 5, terminal 50 (or mobile device 50) may include one or more A (502a, 502b ... ..., 502n is used to show in figure) (processor 502 can include but is not limited to micro- place to processor 502 Manage the processing unit of device MCU or programmable logic device FPGA etc.), memory 504 for storing data and for communicating The transmission module 506 of function.In addition to this, can also include:Display, input/output interface (I/O interfaces), general serial Port bus (USB) (can as a port in the port of I/O interfaces by including), network interface, power supply and/or phase Machine.It will appreciated by the skilled person that structure shown in fig. 5 is only to illustrate, not to the knot of above-mentioned electronic device It is configured to limit.For example, terminal 50 may also include than shown in Fig. 5 more either less components or with Different configuration shown in Fig. 5.
It is to be noted that said one or multiple processors 502 and/or other data processing circuits lead to herein Can often it be referred to as " data processing circuit ".The data processing circuit all or part of can be presented as software, hardware, firmware Or any other combination.In addition, data processing circuit can be single independent processing module or all or part of be attached to meter In any one in other elements in calculation machine terminal 50 (or mobile device).As involved in the embodiment of the present application, The data processing circuit controls (such as the selection for the variable resistance end path being connect with interface) as a kind of processor.
Memory 504 can be used for storing the software program and module of application software, such as the access in the embodiment of the present invention Corresponding program instruction/the data storage device of method of network, processor 502 are stored in soft in memory 504 by operation Part program and module realize the loophole inspection of above-mentioned application program to perform various functions application and data processing Survey method.Memory 504 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 504 can further comprise The memory remotely located relative to processor 502, these remote memories can pass through network connection to terminal 50. The example of above-mentioned network includes but not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.
Transmitting device 506 is used to receive via a network or transmission data.Above-mentioned network specific example may include The wireless network that the communication providers of terminal 50 provide.In an example, transmitting device 506 includes that a network is suitable Orchestration (Network Interface Controller, NIC), can be connected with other network equipments by base station so as to Internet is communicated.In an example, transmitting device 506 can be radio frequency (Radio Frequency, RF) module, For wirelessly being communicated with internet.
Display can such as touch-screen type liquid crystal display (LCD), which may make that user can be with The user interface of terminal 50 (or mobile device) interacts.
Under above-mentioned running environment, this application provides the methods of access network as shown in FIG. 6.In first terminal side, Fig. 6 is the flow chart of the method for according to embodiments of the present invention two access network.
Step S602, first terminal determine that data connection to be visited needs to access Virtual Private Network;
In the application above-mentioned steps S602, the first terminal 121 in corresponding embodiment 1 in Fig. 2 and Fig. 3, first terminal 121 Whether the data of detection current accessed connect the Internet resources in Virtual Private Network.
Specifically, first terminal 121 is with laptop or desk-top in the method for access network provided in this embodiment Illustrated for computer, when user opens random procedure using computer, run on the system of current computer to the data into Whether row detection, the data storage location for detecting program connection are derived from VPN network.
Step S604, first terminal send access authentication request to second terminal, wherein access authentication is asked, for referring to Show prestore authentication information of the second terminal according to the first terminal carried in access authentication request, judges whether confirmation first Terminal for accessing virtual dedicated network;
It is program connection in testing result in the application above-mentioned steps S604 based on the detection in above-mentioned steps S602 Data storage location whether be derived from VPN network, at this time first terminal to second terminal send access authentication request.
Step S606, first terminal receive the access confirmation message that second terminal is returned according to access authentication request;
It is asked based on the access authentication sent in above-mentioned steps S604, in the application above-mentioned steps S606, first terminal connects Receive the access confirmation message that second terminal is returned according to access authentication request, wherein the access confirmation message is used to indicate the One terminal is proved to be successful in the secondary of second terminal, can access VPN network.
Step S608, first terminal is according to the Virtual Private Network belonging to access confirmation message access server.
Based on the access confirmation message received in step S606, in the application above-mentioned steps S602, first terminal foundation Network belonging to the access confirmation message access server.
In the method for access network provided by the embodiments of the present application, determine that data connection to be visited needs by first terminal Access Virtual Private Network;First terminal sends access authentication request to second terminal, wherein access authentication is asked, and is used for Second terminal is indicated according to the authentication information that prestores of first terminal carried in access authentication request, judges whether confirmation the One terminal for accessing virtual dedicated network;First terminal receives the access confirmation letter that second terminal is returned according to access authentication request Breath;First terminal has reached according to the Virtual Private Network belonging to access confirmation message access server without password login VPN's Purpose promotes the technique effect for logging in efficiency to realize, and then solves since what logging in VPN in the prior art was brought steps on Record the low technical problem of efficiency.
Optionally, first terminal determines that data connection to be visited needs to access Virtual Private Network packet in step S602 It includes:
Step1, first terminal parse the data of current accessed, obtain the target access information in data, wherein target is visited Ask that information includes:At least one of the access identities carried in path address, Internet protocol address or data;
In the application above-mentioned steps Step1, whether the data that current accessed how is detected in first terminal connect virtually specially During with the Internet resources in network, firstly, it is necessary to parse the data of the current accessed, the target obtained in the data is visited Ask information, that is, in embodiment 1 in Fig. 3, the checking system in first terminal parses data to be visited, obtains and is connected in the data Routing information (that is, target access information in the embodiment of the present application) whether connect the Internet resources in VPN.
What needs to be explained here is that the target access information in the embodiment of the present application includes:Path address, Internet protocol At least one of the access identities carried in address or data, for example, being connected to a text in VPN network in data to be visited Part presss from both sides path, Ke Yiru:" 200.200.X.XX/ file A/ sub-folders 1 ";Alternatively, carrying VPN in the data to be visited The IP address of network;Alternatively, storing a check list in first terminal, it is local that each first terminal is stored in the list The feature group cluster connected in data and VPN network, this feature group cluster are according to every group of local data in this feature group cluster It is formed with the access identities that the resource path information of corresponding VPN network generates.
Step2, first terminal match target access information with the access data list that prestores, and judge that target access is believed Whether breath matches with the mark for accessing access virtual private network in data list that prestores.
Based on the target access information that above-mentioned steps Step1 is obtained, visited according to the target in the application above-mentioned steps Step2 It asks that information is matched with the access data list that prestores, judges whether the target access information connects with the access data list that prestores Enter the mark matching of Virtual Private Network.
Further, optionally, in the Step2 in step S602 first terminal judge target access information whether in advance After depositing the mark matching for accessing access virtual private network in data list, first terminal is sent out to second terminal in step S604 Send access authentication request include:
Step1, in the case where the judgment result is yes, first terminal display reminding information, wherein prompt message is for referring to Show user whether access virtual private network;
It is that target access information connects with the access data list that prestores in judging result in the application above-mentioned steps Step1 Enter Virtual Private Network mark it is matched in the case of, first terminal display reminding information, Fig. 3 is corresponding in corresponding embodiment 1 Embodiment, the mark of checking system access virtual private network in detection target access information and the access data list that prestores It in the case of matched, is detected successfully to custom system feedback, and by custom system display reminding information, the prompt message is for carrying Whether awake user accesses VPN network.
Step2, first terminal, which receives, confirms incoming instruction, wherein confirms incoming instruction, is used to indicate first terminal confirmation Access virtual private network;
Based on the prompt message shown in above-mentioned steps Step1, the use in the application above-mentioned steps Step2 in first terminal Family system receives the trigger action that user confirms the icon or button that access by touching, the confirmation generated according to the trigger action Incoming instruction.
Step3, first terminal send access authentication request according to confirmation incoming instruction to second terminal.
Based on the confirmation incoming instruction that above-mentioned steps Step2 is received, in the application above-mentioned steps Step3, first terminal according to According to the confirmation incoming instruction access authentication request is sent to second terminal.
Optionally, the first terminal in step S608 is according to the Virtual Private Network belonging to access confirmation message access server Network includes:
Step1, in the case where accessing the verification signaling of confirmation message carrying second terminal, first terminal is believed according to verification The authentication information that enables and prestore generates access request;
In the application above-mentioned steps Step1, the authentication information that prestores be may include verification certificate in first terminal (for example, safety certificate), first terminal is in the case where receiving the confirmation message for the verification signaling for carrying second terminal, knot The verification signaling carried in the access confirmation message that second terminal is sent and verification certificate are closed, access request is generated.
Step2, first terminal send access request to server.
Based on the access request generated in above-mentioned steps Step1, in the application above-mentioned steps Step2, first terminal is to clothes Business device sends the access request.
Further, optionally, the authentication information that prestores includes:Verify certificate, wherein verifying certificate includes:Account And password, account and password are for logging in Virtual Private Network.
Optionally, the method for access network provided in this embodiment further includes:
Step S609, after first terminal access virtual private network, in preset time section, first terminal detection With the presence or absence of the operation to Virtual Private Network request data;
In the application above-mentioned steps S609, belonging to step S602 to step S608 first terminal access servers VPN network, after first terminal 121 accesses VPN network, first terminal 121 enters similar " monitoring " pattern, wherein setting Preset time section, that is, if not detecting that first terminal 121 is asked to Virtual Private Network in the preset time section The operation of data.
Step S610, in the case where testing result is no, first terminal judges whether current sensing time is more than or waits Upper limit threshold in preset time section;
It is first terminal inspection in testing result in the application above-mentioned steps S610 based on the detection in above-mentioned steps S609 In the case of surveying there is no the operation to Virtual Private Network request data, it is pre- to judge whether current sensing time is greater than or equal to If the upper limit threshold of time interval;Here judge whether current sensing time is greater than or equal to the upper limit threshold in preset time section Value, for judging that current first terminal access VPN whether there is timeout case, that is, user leaves first terminal, pauses at first Manual operation in terminal can be used as by the detection of step S609 and step S610 and ensure sentencing before VPN network safety Disconnected evaluation condition.
Step S611, in the case where the judgment result is yes, first terminal are disconnected to Virtual Private Network transmission and are asked It asks, wherein disconnect request, be used to indicate the link that server disconnects first terminal access virtual private network.
Based on the judgement in above-mentioned steps S610, in the application above-mentioned steps S611, sentence for first terminal in judging result In the case that disconnected current sensing time is greater than or equal to the upper limit threshold in preset time section, first terminal is sent to VPN network Disconnect request.To disconnect the link between VPN network.
The method of access network provided in this embodiment can make user exempt from close high safety to automatically access company Intranet, with When householder moves access Intranet resource, actively prompt the user whether to need to access Intranet, if the user determine that need to access Intranet, that A notice can be pushed to the token mobile phone of user's registration and carries out secondary-confirmation, and carrying out VPN on backstage later dials in, and entirely connects It is fully transparent, unaware to enter process for a user.It is actively disconnected after user's access network-free network demand several minutes Open Intranet connection.
Embodiment 3
This application provides the methods of access network as shown in Figure 7.In second terminal side, Fig. 7 is according to of the invention real Apply the flow chart of the method for the access network of example three.
Step S702, second terminal receive the access authentication request that first terminal is sent;
In the application above-mentioned steps S702, based on the system of the access networks provided of Fig. 1 to Fig. 3 in embodiment 1, in conjunction with reality The method for applying the access network that first terminal side in example 2 provides, the embodiment of the present application receive first terminal hair in second terminal side The access authentication request sent, wherein access authentication request is used to indicate second terminal according to being carried in access authentication request The authentication information that prestores of first terminal judges whether to confirm first terminal access virtual private network;Judgment step is shown in step Rapid S704.
Step S704, prestore authentication information of the second terminal according to the first terminal carried in access authentication request, Judge whether to confirm first terminal access virtual private network;
It is asked based on the access authentication received in step S702, in the application above-mentioned steps S704, second terminal foundation connects The authentication information that prestores for entering the first terminal carried in certification request judges whether to confirm that first terminal access of virtual is special Network.
Step S706, in the case where the judgment result is yes, second terminal send access confirmation message to first terminal.
It is to confirm that first terminal connects in judging result in the application above-mentioned steps S706 based on the judgement in step S704 In the case of entering Virtual Private Network, second terminal sends access confirmation message to first terminal.
In the method for access network provided by the embodiments of the present application, the access that first terminal is sent is received by second terminal Certification request;Prestore authentication information of the second terminal according to the first terminal carried in access authentication request, judges whether Confirm first terminal access virtual private network;In the case where the judgment result is yes, second terminal connects to first terminal transmission Enter confirmation message, achieved the purpose that without password login VPN, promotes the technique effect for logging in efficiency to realize, and then solve It has determined due to the low technical problem of logging in VPN is brought in the prior art login efficiency.
Optionally, second terminal is tested according to the identity that prestores of the first terminal carried in access authentication request in step S704 Information is demonstrate,proved, judges whether to confirm that first terminal access virtual private network includes:
Step1, the authentication information that prestores of the first terminal carried in second terminal parsing access authentication request, obtains The verification certificate to prestore in identity information, wherein verification certificate includes:Account and password, account and password are virtual for logging in Dedicated network;
In the application above-mentioned steps Step1, the in the system of the access network provided in Fig. 2 and Fig. 3 in corresponding embodiment 1 Two terminal parts, the authentication information that prestores of the first terminal carried in second terminal parsing access authentication request, obtain pre- Deposit the verification certificate in identity information, wherein verifying certificate includes:Account and password, account and password are virtual special for logging in Use network.
Whether Step2, second terminal detection verification certificate match with the verification signaling of access virtual private network, wherein It is pre-stored verification array in second terminal to verify signaling.
Based on the judgement in step Step1, in the application above-mentioned steps Step2, whether second terminal detection verification certificate It is matched with the verification signaling of access virtual private network.
Specifically, in conjunction with above-mentioned steps Step1 and Step2, in second terminal side, second terminal can pass through handset token Mode access authentication request that first terminal is sent carry out secondary verification, wherein handset token is verified, can be by the The application program that two terminals install network access security verification class realizes that the method for access network provided by the embodiments of the present application is only It is illustrated in the way of handset token, is subject to and realizes the method provided by the embodiments of the present application for accessing network, specifically It does not limit.
Embodiment 4
This application provides the methods of access network as shown in Figure 8.In server side, Fig. 8 is implemented according to the present invention The flow chart of the method for the access network of example four.
Step S802, server receive the access request that first terminal is sent;
In the application above-mentioned steps S802, based on the system of the access networks provided of Fig. 1 to Fig. 3 in embodiment 1, in conjunction with reality Apply the access network that second terminal side provides in the method for accessing network and embodiment 3 that first terminal side in example 2 provides Method, the embodiment of the present application receive the access request that first terminal is sent in server side, server.
Step S804, server is according to access request by the Virtual Private Network belonging to first terminal access server.
Based on the access request that server in step S802 receives, in the application above-mentioned steps S804, server is according to connecing Enter request by the Virtual Private Network belonging to first terminal access server.
In the method for access network provided by the embodiments of the present application, the access that first terminal is sent is received by server and is asked It asks;Server has reached the Virtual Private Network belonging to first terminal access server without password login according to access request The purpose of VPN promotes the technique effect for logging in efficiency to realize, and then solves due to logging in VPN band in the prior art The low technical problem of next login efficiency.
Optionally, in step S804 server according to access request by the virtual private belonging to first terminal access server Network includes:
Step1, parse access request, obtain access request in carry first terminal prestore authentication information and The verification signaling of second terminal;
Step2 is verified and is prestored authentication information and verify whether signaling meets default access standard;
Step3, in the case where check results are to be, server is by the virtual private belonging to first terminal access server Network.
Specifically, in conjunction with step Step1 to step Step3, server is obtained by parsing access request in access request The verification signaling of prestore authentication information and the second terminal of the first terminal of carrying;Verification prestore authentication information and Whether verification signaling meets default access standard;In the case where check results are to be, server is by first terminal access service Virtual Private Network belonging to device.
In addition, in addition to the process of above-mentioned server authentication, after server receives access request, server can be with Directly by the VPN network belonging to first terminal access, verification process is reduced with this, first terminal is saved and accesses the VPN network time, Promote access efficiency.
Optionally, the method for access network provided by the embodiments of the present application further includes:
Step S805, receive first terminal transmission disconnects request;
Step S806 cuts off first terminal access virtual private network according to breaking connection request.
Specifically, in conjunction with step S805 and step S806, based on Fig. 4 in embodiment 1, server receives first terminal hair That send disconnects request, and after disconnecting request receive that first terminal sends, according to breaking connection request, cut-out First terminal access virtual private network.
Embodiment 5
This application provides the methods of access network as shown in Figure 9.In the checking system side of first terminal, Fig. 9 is root According to the flow chart of the method for the access network of the embodiment of the present invention five.
Step S902, detects whether data to be visited in custom system connect the Internet resources in Virtual Private Network;
In the application above-mentioned steps S902, the system for the access network that Fig. 3 is provided in corresponding embodiment 1, the application is implemented Whether example data to be visited in the checking system side of first terminal, checking system detection custom system connect Virtual Private Network In Internet resources.
Step S904 sends prompt message, wherein prompt message in the case where testing result is to be to custom system Be used to indicate custom system whether access virtual private network;
Based on the detection of step S902, in the application above-mentioned steps S904, waited in testing result is detection custom system In the case of accessing the Internet resources in data connection Virtual Private Network, checking system sends prompt message to custom system, Wherein, prompt message be used to indicate custom system whether access virtual private network.
Step S906 sends access to second terminal and recognizes according to the confirmation access information that the custom system received returns Card request.
Based on the prompt message that step S904 is sent, in the application above-mentioned steps S906, checking system is according to receiving The confirmation access information that custom system returns sends access authentication request to second terminal.
In the method for access network provided by the embodiments of the present application, by detecting whether data to be visited in custom system connect Connect the Internet resources in Virtual Private Network;In the case where testing result is to be, prompt message is sent to custom system, In, prompt message be used to indicate custom system whether access virtual private network;It is returned really according to the custom system received Recognize access information, sends access authentication request to second terminal, achieved the purpose that, without password login VPN, to carry to realize The technique effect for logging in efficiency is risen, and then is solved since the low technology of logging in VPN is brought in the prior art login efficiency is asked Topic.
Embodiment 6
This application provides the methods of access network as shown in Figure 10.In the custom system side of first terminal, Tu10Shi The flow chart of the method for according to embodiments of the present invention six access network.
Step S1002 receives the prompt message that checking system is sent;
In the application above-mentioned steps S1002, the system for the access network that Fig. 3 is provided in corresponding embodiment 1, the application is implemented Example receives the prompt message that checking system is sent in the custom system side of first terminal, custom system.
Step S1004 is returned according to prompt message and is confirmed access information.
Based on the prompt message that step S1002 is received, in the application above-mentioned steps S1004, custom system is believed according to prompt Breath, which returns, confirms access information.
In the method for access network provided by the embodiments of the present application, by the prompt message for receiving checking system transmission;According to It is returned according to prompt message and confirms access information, achieved the purpose that without password login VPN, efficiency is logged in realize to be promoted Technique effect, and then solve due to the low technical problem of logging in VPN is brought in the prior art login efficiency.
To sum up, the system based on the access network provided in embodiment 1, in conjunction with the embodiments 2 to embodiment 6 access provided The method of the method for network, access network provided by the embodiments of the present application is specific as follows:
Detection access company Intranet demand, prompts the user whether in the method for access network provided by the embodiments of the present application Company Intranet is accessed, token mobile phone secondary-confirmation accesses company Intranet, and no Intranet requirements for access disconnects Intranet connection, specific to flow Journey is as follows:
(1) hook is carried out to socket data in system level, the main purpose of hook is to confirm whether access address is public Take charge of internal address;
(2) after detecting company Intranet access network request, user is prompted;
(3) user's confirmation needs after accessing company Intranet, and user is prompted to carry out token mobile phone secondary-confirmation;
(4) it after user completes two-factor authentication, dials VPN on backstage and accesses company Intranet;
(5) hook of the socket of system level actively disconnects VPN connections, protection company Intranet money upon timing-out Source.
The method of access network provided by the embodiments of the present application can make user exempt from close high safety to automatically access company Intranet, When user actively accesses Intranet resource, actively prompt the user whether to need to access Intranet, if the user determine that needing in access Net, then can push a notice to the token mobile phone of user's registration carries out secondary-confirmation, carrying out VPN on backstage later dials in, Entire access procedure is fully transparent, unaware for a user.After user's access network-free network demand several minutes, Actively disconnect Intranet connection.
The method of access network provided by the embodiments of the present application can pass through actively under the premise of ensureing dual factors safety It prompts user to access Intranet, and promotes the sign-in experience of user, save user's login time cost;Protect Intranet resource simultaneously.
It should be noted that for each method embodiment above-mentioned, for simple description, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the described action sequence because According to the present invention, certain steps can be performed in other orders or simultaneously.Secondly, those skilled in the art should also know It knows, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of the access network of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hard Part, but the former is more preferably embodiment in many cases.Based on this understanding, technical scheme of the present invention substantially or Say that the part that contributes to existing technology can be expressed in the form of software products, which is stored in In one storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be hand Machine, computer, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 7
According to the embodiment of the present application, it is real to additionally provide a kind of device for implementing two corresponding embodiment of the method for embodiment Example is applied, the device that the above embodiments of the present application are provided can be run on first terminal.
Figure 11 is the structural schematic diagram of the device of according to embodiments of the present invention seven access network.
As shown in figure 11, the device of the access network includes:First detection module 1102, the first sending module 1104, One receiving module 1106 and the first AM access module 1108, wherein
First detection module 1102, for determining that data connection to be visited needs to access Virtual Private Network;First hair Module 1104 is sent, for sending access authentication request to second terminal, wherein access authentication is asked, and second terminal is used to indicate According to the authentication information that prestores of the first terminal carried in access authentication request, judge whether to confirm that first terminal access is empty Quasi- dedicated network;First receiving module 1106, the access confirmation letter returned according to access authentication request for receiving second terminal Breath;First AM access module 1108, for according to the Virtual Private Network belonging to access confirmation message access server.
In the device of access network provided by the embodiments of the present application, determine that data connection to be visited needs by first terminal Access Virtual Private Network;First terminal sends access authentication request to second terminal, wherein access authentication is asked, and is used for Second terminal is indicated according to the authentication information that prestores of first terminal carried in access authentication request, judges whether confirmation the One terminal for accessing virtual dedicated network;First terminal receives the access confirmation letter that second terminal is returned according to access authentication request Breath;First terminal has reached according to the Virtual Private Network belonging to access confirmation message access server without password login VPN's Purpose promotes the technique effect for logging in efficiency to realize, and then solves since what logging in VPN in the prior art was brought steps on Record the low technical problem of efficiency.
Herein it should be noted that above-mentioned first detection module 1102, the first sending module 1104, the first receiving module 1106 and first AM access module 1108 correspond to the step S602 to step S608 in embodiment two, four modules and corresponding step Suddenly the example realized is identical with application scenarios, but is not limited to the above embodiments two disclosure of that.On it should be noted that State module as a part for device may operate in embodiment two offer first terminal in, can by software realization, Hardware realization can be passed through.
Embodiment 8
According to the embodiment of the present application, it is real to additionally provide a kind of device for implementing three corresponding embodiment of the method for embodiment Example is applied, the device that the above embodiments of the present application are provided can be run in second terminal.
Figure 12 is the structural schematic diagram of the device of according to embodiments of the present invention eight access network.
As shown in figure 12, the device of the access network includes:Second receiving module 1202, the first authentication module 1204 and Two sending modules 1206, wherein
Second receiving module 1202, the access authentication request for receiving first terminal transmission;First authentication module 1204, For the authentication information that prestores according to the first terminal carried in access authentication request, judge whether to confirm that first terminal connects Enter Virtual Private Network;Second sending module 1206, in the case where the judgment result is yes, sending and accessing to first terminal Confirmation message.
In the device of access network provided by the embodiments of the present application, the access that first terminal is sent is received by second terminal Certification request;Prestore authentication information of the second terminal according to the first terminal carried in access authentication request, judges whether Confirm first terminal access virtual private network;In the case where the judgment result is yes, second terminal connects to first terminal transmission Enter confirmation message, achieved the purpose that without password login VPN, promotes the technique effect for logging in efficiency to realize, and then solve It has determined due to the low technical problem of logging in VPN is brought in the prior art login efficiency.
Herein it should be noted that above-mentioned second receiving module 1202, the first authentication module 1204 and the second sending module 1206 correspond to the step S702 to step S706 in embodiment three, the example and answer that three modules and corresponding step are realized It is identical with scene, but it is not limited to the above embodiments three disclosure of that.It should be noted that above-mentioned module as device one Part may operate in the second terminal of the offer of embodiment three, can also pass through hardware realization by software realization.
Embodiment 9
According to the embodiment of the present application, a kind of Intelligent hardware embodiment is additionally provided, what the above embodiments of the present application were provided Intelligent hardware can be run in second terminal.The Intelligent hardware, including:Transmitter/receivers, processor, memory and display screen, In, transmitter/receivers, the access authentication request for receiving first terminal transmission;Processor is connect with transmitter/receivers, is connect for foundation The authentication information that prestores for entering the first terminal carried in certification request judges whether to confirm that first terminal access of virtual is special Network, wherein processor is by calling the verification signaling stored in memory to judge whether to confirm that first terminal access of virtual is special With network, and judging result is shown by display screen;Transmitter/receivers is additionally operable in the case where the judgment result is yes, eventually to first End sends access confirmation message.
In the device of access network provided by the embodiments of the present application, by transmitter/receivers, for receiving first terminal transmission Access authentication is asked;Processor is connect with transmitter/receivers, for prestoring according to the first terminal carried in access authentication request Authentication information judges whether to confirm first terminal access virtual private network, wherein processor is by calling in memory The verification signaling of storage judges whether to confirm first terminal access virtual private network, and shows judging result by display screen; Transmitter/receivers, is additionally operable in the case where the judgment result is yes, sends access confirmation message to first terminal, has reached without password The purpose of logging in VPN promotes the technique effect for logging in efficiency to realize, and then solves due to logging in the prior art The low technical problem of login efficiency that VPN is brought.
Embodiment 10
According to the embodiment of the present application, it is real to additionally provide a kind of device for implementing the corresponding embodiment of the method for example IV Example is applied, the device that the above embodiments of the present application are provided can be run on the server.
Figure 13 is the structural schematic diagram of the device of according to embodiments of the present invention ten access network.
As shown in figure 13, the device of the access network includes:Third receiving module 1302 and the second AM access module 1304, In,
Third receiving module 1302, the access request for receiving first terminal transmission;Second AM access module 1304, is used for According to access request by the Virtual Private Network belonging to first terminal access server.
In the device of access network provided by the embodiments of the present application, the access that first terminal is sent is received by server and is asked It asks;Server has reached the Virtual Private Network belonging to first terminal access server without password login according to access request The purpose of VPN promotes the technique effect for logging in efficiency to realize, and then solves due to logging in VPN band in the prior art The low technical problem of next login efficiency.
Herein it should be noted that 1302 and second AM access module 1304 of above-mentioned third receiving module corresponds to embodiment three In step S802 to step S804, the example and application scenarios that two modules and corresponding step are realized be identical but unlimited In four disclosure of that of above-described embodiment.It should be noted that above-mentioned module may operate in reality as a part for device In the server that the offer of example four is provided, it can also pass through hardware realization by software realization.
Embodiment 11
According to the embodiment of the present application, it is real to additionally provide a kind of device for implementing five corresponding embodiment of the method for embodiment Example is applied, the device that the above embodiments of the present application are provided can be run in the checking system of first terminal.
Figure 14 is the structural schematic diagram of the device of according to embodiments of the present invention 11 access network.
As shown in figure 14, the device of the access network includes:Second detection module 1402, third sending module 1404 and Four sending modules 1406, wherein
Second detection module 1402, for detecting whether data to be visited in custom system connect in Virtual Private Network Internet resources;Third sending module 1404, in the case where testing result is to be, prompt message to be sent to custom system, Wherein, prompt message be used to indicate custom system whether access virtual private network;4th sending module 1406, foundation receive Custom system return confirmation access information, to second terminal send access authentication request.
In the device of access network provided by the embodiments of the present application, by detecting whether data to be visited in custom system connect Connect the Internet resources in Virtual Private Network;In the case where testing result is to be, prompt message is sent to custom system, In, prompt message be used to indicate custom system whether access virtual private network;It is returned really according to the custom system received Recognize access information, sends access authentication request to second terminal, achieved the purpose that, without password login VPN, to carry to realize The technique effect for logging in efficiency is risen, and then is solved since the low technology of logging in VPN is brought in the prior art login efficiency is asked Topic.
Herein it should be noted that above-mentioned second detection module 1402, third sending module 1404 and the 4th sending module 1406 correspond to the step S902 to step S906 in embodiment five, the example and answer that three modules and corresponding step are realized It is identical with scene, but it is not limited to the above embodiments five disclosure of that.It should be noted that above-mentioned module as device one Part may operate in the checking system of the first terminal of the offer of embodiment five, can also be passed through by software realization Hardware realization.
Embodiment 12
According to the embodiment of the present application, it is real to additionally provide a kind of device for implementing six corresponding embodiment of the method for embodiment Example is applied, the device that the above embodiments of the present application are provided can be run in the checking system of first terminal.
Figure 15 is the structural schematic diagram of the device of according to embodiments of the present invention 12 access network.
As shown in figure 15, the device of the access network includes:4th receiving module 1502 and the 5th sending module 1504, In,
4th receiving module 1502, the prompt message for receiving checking system transmission;5th sending module 1504, is used for It is returned according to prompt message and confirms access information.
In the device of access network provided by the embodiments of the present application, by the prompt message for receiving checking system transmission;According to It is returned according to prompt message and confirms access information, achieved the purpose that without password login VPN, efficiency is logged in realize to be promoted Technique effect, and then solve due to the low technical problem of logging in VPN is brought in the prior art login efficiency.
Herein it should be noted that above-mentioned 4th receiving module 1502 and the 5th sending module 1504 correspond to embodiment five In step S1002 to step S1004, two modules are identical as example and application scenarios that corresponding step is realized, but not It is limited to six disclosure of that of above-described embodiment.It should be noted that above-mentioned module may operate in as a part for device In the custom system for the first terminal that embodiment six provides, it can also pass through hardware realization by software realization.
Embodiment 13
The embodiments of the present invention also provide a kind of storage mediums.Optionally, in the present embodiment, above-mentioned storage medium can For preserving the program code performed by the method for the access network that above-described embodiment one is provided.
Optionally, in the present embodiment, above-mentioned storage medium can be located in computer network Computer terminal group In any one terminal, or in any one mobile terminal in mobile terminal group.
Optionally, in the present embodiment, storage medium is arranged to store the program code for executing following steps:Really Fixed data connection to be visited needs to access Virtual Private Network;Access authentication request is sent to second terminal, wherein access is recognized Card request is used to indicate prestore authentication information of the second terminal according to the first terminal carried in access authentication request, sentences It is disconnected whether to confirm first terminal access virtual private network;The access that second terminal is returned according to access authentication request is received to confirm Information;According to the Virtual Private Network belonging to access confirmation message access server.
Optionally, in the present embodiment, storage medium is arranged to store the program code for executing following steps:Really Fixed data connection to be visited needs to access Virtual Private Network:The data of current accessed are parsed, the mesh in data is obtained Mark access information, wherein target access information includes:The access mark carried in path address, Internet protocol address or data At least one of know;Target access information is matched with the access data list that prestores, whether judges target access information The mark for accessing access virtual private network in data list matches with prestoring.
Further, optionally, in the present embodiment, storage medium is arranged to store the journey for executing following steps Sequence code:First terminal judge target access information whether with prestore access data list in access virtual private network mark After knowing matching, sending access authentication request to second terminal includes:In the case where the judgment result is yes, display reminding is believed Breath, wherein prompt message be used to indicate user whether access virtual private network;It receives and confirms incoming instruction, wherein confirmation connects Enter instruction, is used to indicate first terminal and confirms access virtual private network;It is connect according to confirming that incoming instruction is sent to second terminal Enter certification request.
Optionally, in the present embodiment, storage medium is arranged to store the program code for executing following steps:According to Include according to the Virtual Private Network belonging to access confirmation message access server:Testing for second terminal is carried in access confirmation message In the case of demonstrate,proving signaling, access request is generated according to verification signaling and the authentication information that prestores;Access is sent to server to ask It asks.
Further, optionally, the authentication information that prestores includes:Verify certificate, wherein verifying certificate includes:Account And password, account and password are for logging in Virtual Private Network.
Optionally, in the present embodiment, storage medium is arranged to store the program code for executing following steps: After first terminal access virtual private network, in preset time section, first terminal detects whether exist to virtual private The operation of network request packet;Testing result be it is no in the case of, first terminal judge current sensing time whether be more than or Equal to the upper limit threshold in preset time section;In the case where the judgment result is yes, first terminal is sent to Virtual Private Network Disconnect request, wherein disconnect request, be used to indicate the chain that server disconnects first terminal access virtual private network Road.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
In the above embodiment of the present invention, all emphasizes particularly on different fields to the description of each embodiment, do not have in some embodiment The part of detailed description may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, for example, the unit division, only A kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module It connects, can be electrical or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned includes:USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can to store program code Medium.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (26)

1. a kind of system of access network, which is characterized in that including:Terminal and server, wherein
The terminal is verified for determining that data connection to be visited needs to connect Virtual Private Network by default verification mode The data to be visited, and according to verification result access request is sent to the server, wherein the default verification mode is used Whether meet the standard for accessing the server in the authentication information that prestores for verifying the terminal;Belonging to the server Network is the Virtual Private Network;
The server is connect with the terminal, the access request sent for receiving the terminal, and is connect according to described Enter and asks to access the terminal into the Virtual Private Network belonging to the server.
2. the system of access network according to claim 1, which is characterized in that the terminal includes:First terminal and Two terminals, wherein
The first terminal, for determining that data connection to be visited needs to connect the Internet resources in the Virtual Private Network; And send access authentication request to the second terminal, wherein access authentication request, be used to indicate the second terminal according to Prestore authentication information described in being asked according to the access authentication, judges whether to confirm that the first terminal accesses the void Quasi- dedicated network;The authentication information that prestores includes:Verify certificate;
The second terminal is connect with the first terminal, for receiving the access authentication request, and detects the verification card Whether book matches with the verification signaling for accessing the Virtual Private Network;In the case where testing result is to be, to described first Terminal returns to access confirmation message, so that the first terminal sends institute according to the access confirmation message to the server State access request.
3. the system of access network according to claim 2, which is characterized in that the verification certificate includes:Account and close Code, the account and password are for logging in the Virtual Private Network.
4. the system of access network according to claim 2, which is characterized in that the first terminal includes:Custom system And checking system, wherein
The checking system, for detecting whether data to be visited in the custom system connect in the Virtual Private Network Internet resources;And send prompt message to the custom system, wherein the prompt message, which is used to indicate the custom system, is The no access Virtual Private Network;
The custom system is connect with the checking system, is returned for receiving the prompt message, and according to the prompt message It returns and confirms access information;
The checking system is additionally operable to, according to the confirmation access information received, connect to described in second terminal transmission Enter certification request.
5. the system of access network according to claim 2, which is characterized in that the first terminal is additionally operable in access institute After stating Virtual Private Network, in preset time section, detect whether exist to the Virtual Private Network request data Operation judges whether current sensing time is greater than or equal in the preset time section in the case where testing result is no Upper limit threshold, in the case where the judgment result is yes, to the Virtual Private Network transmission disconnect request, wherein institute It states and disconnects request, be used to indicate the server and disconnect the link that the first terminal accesses the Virtual Private Network.
6. the system of access network according to claim 2 or 4, which is characterized in that the second terminal includes:It is mobile whole End;Wherein, the mobile terminal, for receiving the access authentication request, and carried in being asked according to the access authentication The verification array to prestore in the verification certificate and the mobile terminal is verified, in the case where being proved to be successful, to institute It states first terminal and returns to the access confirmation message.
7. the system of access network according to claim 5, which is characterized in that the server is additionally operable to described in reception What first terminal was sent disconnects request, and according to the breaking connection request, cuts off the first terminal and access the void Quasi- dedicated network.
8. a method of access network, which is characterized in that including:
First terminal determines that data connection to be visited needs to access Virtual Private Network;
The first terminal sends access authentication request to second terminal, wherein the access authentication request is used to indicate described The authentication information that prestores for the first terminal that second terminal carries in being asked according to the access authentication judges whether really Recognize the first terminal and accesses the Virtual Private Network;
The first terminal receives the access confirmation message that the second terminal is returned according to access authentication request;
The first terminal is according to the Virtual Private Network belonging to the access confirmation message access server.
9. the method for access network according to claim 8, which is characterized in that the first terminal determines number to be visited According to connection need access Virtual Private Network include:
The first terminal parses the data of the current accessed, obtains the target access information in the data, wherein described Target access information includes:At least one in the access identities carried in path address, Internet protocol address or the data Kind;
The first terminal matches the target access information with the access data list that prestores, and judges the target access Whether information matches with the mark of access virtual private network in the access data list that prestores.
10. the method for access network according to claim 9, which is characterized in that judge the mesh in the first terminal After whether mark access information matches with the mark of access virtual private network in the access data list that prestores, described first Terminal sends access authentication request to second terminal:
In the case where the judgment result is yes, the first terminal display reminding information, wherein prompt message is used to indicate user Whether the Virtual Private Network is accessed;
The first terminal, which receives, confirms incoming instruction, wherein it is true to be used to indicate the first terminal for the confirmation incoming instruction Recognize the access Virtual Private Network;
The first terminal sends access authentication request according to the confirmation incoming instruction to the second terminal.
11. the method for access network according to claim 8, which is characterized in that the first terminal is according to the access The Virtual Private Network belonging to confirmation message access server includes:
In the case where the access confirmation message carries the verification signaling of the second terminal, the first terminal is according to described in Verification signaling and the authentication information that prestores generate access request;
The first terminal sends the access request to the server.
12. the method for access network according to claim 11, which is characterized in that the authentication information packet that prestores It includes:Verify certificate, wherein the verification certificate includes:Account and password, the account and password are described virtual special for logging in Use network.
13. the method for access network according to claim 8, which is characterized in that the method further includes:
After the first terminal accesses the Virtual Private Network, in preset time section, the first terminal detection With the presence or absence of the operation to the Virtual Private Network request data;
In the case where testing result is no, it is described default that the first terminal judges whether current sensing time is greater than or equal to The upper limit threshold of time interval;
In the case where the judgment result is yes, the first terminal disconnects request to Virtual Private Network transmission, In, it is described to disconnect request, it is used to indicate the server and disconnects the first terminal and access the Virtual Private Network Link.
14. a kind of method of access network, which is characterized in that including:
Second terminal receives the access authentication request that first terminal is sent;
The authentication information that prestores for the first terminal that the second terminal carries in being asked according to the access authentication, sentences It is disconnected whether to confirm the first terminal access virtual private network;
In the case where the judgment result is yes, the second terminal sends access confirmation message to the first terminal.
15. the method for access network according to claim 14, which is characterized in that the second terminal is according to the access The authentication information that prestores of the first terminal carried in certification request judges whether to confirm that the first terminal access is empty Quasi- dedicated network includes:
The second terminal parses the authentication information that prestores of the first terminal carried in the access authentication request, obtains To the verification certificate in the identity information that prestores, wherein the verification certificate includes:Account and password, the account and close Code is for logging in the Virtual Private Network;
The second terminal detects whether the verification certificate matches with the verification signaling for accessing the Virtual Private Network, In, the verification signaling is pre-stored verification array in the second terminal.
16. a kind of method of access network, which is characterized in that including:
Server receives the access request that first terminal is sent;
The first terminal is accessed the Virtual Private Network belonging to the server according to the access request by the server.
17. the method for access network according to claim 16, which is characterized in that the server is asked according to the access It asks and includes by the Virtual Private Network belonging to the first terminal access server:
Parse the access request, obtain the first terminal carried in the access request prestore authentication information with And the verification signaling of second terminal;
Whether the authentication information that prestores described in verification and the verification signaling meet default access standard;
In the case where check results are to be, the server accesses the first terminal virtual special belonging to the server Use network.
18. the method for access network according to claim 16, which is characterized in that the method further includes:
Receive the first terminal transmission disconnects request;
And it according to the breaking connection request, cuts off the first terminal and accesses the Virtual Private Network.
19. a kind of method of access network, which is characterized in that including:
Whether data to be visited connect the Internet resources in the Virtual Private Network in detection custom system;
In the case where testing result is to be, prompt message is sent to the custom system, wherein the prompt message is for referring to Show whether the custom system accesses the Virtual Private Network;
According to the confirmation access information that the custom system received returns, sends the access authentication to second terminal and ask It asks.
20. a kind of method of access network, which is characterized in that including:
Receive the prompt message that checking system is sent;
It is returned according to the prompt message and confirms access information.
21. a kind of device of access network, which is characterized in that including:
First detection module, for determining that data connection to be visited needs to access Virtual Private Network;
First sending module, for sending access authentication request to second terminal, wherein the access authentication request, for referring to The authentication information that prestores for showing the first terminal carried during the second terminal is asked according to the access authentication, judges Whether confirm that the first terminal accesses the Virtual Private Network;
First receiving module, the access confirmation message returned according to access authentication request for receiving the second terminal;
First AM access module, for according to the Virtual Private Network belonging to the access confirmation message access server.
22. a kind of device of access network, which is characterized in that including:
Second receiving module, the access authentication request for receiving first terminal transmission;
First authentication module, the authentication letter that prestores of the first terminal for being carried in being asked according to the access authentication Breath, judges whether to confirm the first terminal access virtual private network;
Second sending module, in the case where the judgment result is yes, access confirmation message being sent to the first terminal.
23. a kind of Intelligent hardware, which is characterized in that including:Transmitter/receivers, processor, memory and display screen, wherein described Transmitter/receivers, the access authentication request for receiving first terminal transmission;
The processor is connect with the transmitter/receivers, the first terminal for being carried in being asked according to the access authentication The authentication information that prestores, judge whether to confirm the first terminal access virtual private network, wherein the processor is logical It crosses and the verification signaling stored in the memory is called to judge whether to confirm the first terminal access virtual private network, and lead to It crosses the display screen and shows judging result;
The transmitter/receivers, is additionally operable in the case where the judgment result is yes, and access confirmation message is sent to the first terminal.
24. a kind of device of access network, which is characterized in that including:
Third receiving module, the access request for receiving first terminal transmission;
Second AM access module, it is virtual special belonging to the server for accessing the first terminal according to the access request Use network.
25. a kind of device of access network, which is characterized in that including:
Second detection module, for detecting whether data to be visited in custom system connect network in the Virtual Private Network Resource;
Third sending module, in the case where testing result is to be, prompt message to be sent to the custom system, wherein The prompt message is used to indicate whether the custom system accesses the Virtual Private Network;
4th sending module sends institute according to the confirmation access information that the custom system received returns to second terminal State access authentication request.
26. a kind of device of access network, which is characterized in that including:
4th receiving module, the prompt message for receiving checking system transmission;
5th sending module confirms access information for being returned according to the prompt message.
CN201710031638.5A 2017-01-17 2017-01-17 Method, device and system for accessing network Active CN108322366B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710031638.5A CN108322366B (en) 2017-01-17 2017-01-17 Method, device and system for accessing network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710031638.5A CN108322366B (en) 2017-01-17 2017-01-17 Method, device and system for accessing network

Publications (2)

Publication Number Publication Date
CN108322366A true CN108322366A (en) 2018-07-24
CN108322366B CN108322366B (en) 2021-10-01

Family

ID=62891038

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710031638.5A Active CN108322366B (en) 2017-01-17 2017-01-17 Method, device and system for accessing network

Country Status (1)

Country Link
CN (1) CN108322366B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995759A (en) * 2019-03-04 2019-07-09 平安科技(深圳)有限公司 A kind of method and relevant apparatus of physical machine access VPC
CN112953885A (en) * 2019-12-11 2021-06-11 中国移动通信集团山东有限公司 Virtual private network login method and device and computer equipment
CN113206817A (en) * 2020-02-03 2021-08-03 中移物联网有限公司 Equipment connection confirmation method and block chain network
CN113691545A (en) * 2021-08-26 2021-11-23 中国电信股份有限公司 Routing control method and device, electronic equipment and computer readable medium
CN114546927A (en) * 2020-11-24 2022-05-27 北京灵汐科技有限公司 Data transmission method, core, computer readable medium, electronic device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040268121A1 (en) * 2003-06-30 2004-12-30 Art Shelest Reducing network configuration complexity with transparent virtual private networks
CN101447907A (en) * 2008-10-31 2009-06-03 北京东方中讯联合认证技术有限公司 VPN secure access method and system thereof
CN101784049A (en) * 2009-12-31 2010-07-21 中兴通讯股份有限公司 Method and system thereof for controlling cars through mobile terminal
CN102143492A (en) * 2010-12-06 2011-08-03 东莞宇龙通信科技有限公司 Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN103746812A (en) * 2013-12-30 2014-04-23 迈普通信技术股份有限公司 Access authentication method and system
CN104869043A (en) * 2015-06-04 2015-08-26 魅族科技(中国)有限公司 Method for establishing VPN (Virtual Private Network) connection and terminal
CN105162763A (en) * 2015-07-29 2015-12-16 网神信息技术(北京)股份有限公司 Method and device for processing communication data
CN105827624A (en) * 2016-04-26 2016-08-03 浙江宇视科技有限公司 Identity verifying system
CN105871677A (en) * 2016-05-12 2016-08-17 北京奇虎科技有限公司 Method and device for sharing VPN service among application
CN106209912A (en) * 2016-08-30 2016-12-07 迈普通信技术股份有限公司 Access authorization methods, device and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040268121A1 (en) * 2003-06-30 2004-12-30 Art Shelest Reducing network configuration complexity with transparent virtual private networks
CN101447907A (en) * 2008-10-31 2009-06-03 北京东方中讯联合认证技术有限公司 VPN secure access method and system thereof
CN101784049A (en) * 2009-12-31 2010-07-21 中兴通讯股份有限公司 Method and system thereof for controlling cars through mobile terminal
CN102143492A (en) * 2010-12-06 2011-08-03 东莞宇龙通信科技有限公司 Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN103746812A (en) * 2013-12-30 2014-04-23 迈普通信技术股份有限公司 Access authentication method and system
CN104869043A (en) * 2015-06-04 2015-08-26 魅族科技(中国)有限公司 Method for establishing VPN (Virtual Private Network) connection and terminal
CN105162763A (en) * 2015-07-29 2015-12-16 网神信息技术(北京)股份有限公司 Method and device for processing communication data
CN105827624A (en) * 2016-04-26 2016-08-03 浙江宇视科技有限公司 Identity verifying system
CN105871677A (en) * 2016-05-12 2016-08-17 北京奇虎科技有限公司 Method and device for sharing VPN service among application
CN106209912A (en) * 2016-08-30 2016-12-07 迈普通信技术股份有限公司 Access authorization methods, device and system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995759A (en) * 2019-03-04 2019-07-09 平安科技(深圳)有限公司 A kind of method and relevant apparatus of physical machine access VPC
CN109995759B (en) * 2019-03-04 2022-10-28 平安科技(深圳)有限公司 Method for accessing VPC (virtual private network) by physical machine and related device
CN112953885A (en) * 2019-12-11 2021-06-11 中国移动通信集团山东有限公司 Virtual private network login method and device and computer equipment
CN112953885B (en) * 2019-12-11 2023-04-18 中国移动通信集团山东有限公司 Virtual private network login method and device and computer equipment
CN113206817A (en) * 2020-02-03 2021-08-03 中移物联网有限公司 Equipment connection confirmation method and block chain network
CN113206817B (en) * 2020-02-03 2022-07-12 中移物联网有限公司 Equipment connection confirmation method and block chain network
CN114546927A (en) * 2020-11-24 2022-05-27 北京灵汐科技有限公司 Data transmission method, core, computer readable medium, electronic device
WO2022111462A1 (en) * 2020-11-24 2022-06-02 北京灵汐科技有限公司 Data transmission method, core, computer-readable medium, and electronic device
CN114546927B (en) * 2020-11-24 2023-08-08 北京灵汐科技有限公司 Data transmission method, core, computer readable medium, and electronic device
CN113691545A (en) * 2021-08-26 2021-11-23 中国电信股份有限公司 Routing control method and device, electronic equipment and computer readable medium
CN113691545B (en) * 2021-08-26 2023-03-24 中国电信股份有限公司 Routing control method and device, electronic equipment and computer readable medium

Also Published As

Publication number Publication date
CN108322366B (en) 2021-10-01

Similar Documents

Publication Publication Date Title
CN108322366A (en) Access the methods, devices and systems of network
CN108737327A (en) Intercept method, apparatus, system, processor and the memory of malicious websites
CN109936547A (en) Identity identifying method, system and calculating equipment
EP3179758A1 (en) Building intercom method, nfc unlocking device and building intercom system
CN105933888B (en) A kind of eSIM card method for burn-recording and device based on NFC
CN110351269B (en) Method for logging in open platform through third-party server
CN108512846A (en) Mutual authentication method and device between a kind of terminal and server
CN104618315B (en) A kind of method, apparatus and system of verification information push and Information Authentication
CN104144163B (en) Auth method, apparatus and system
CN105450643B (en) The authentication method of network insertion, apparatus and system
WO2017091401A1 (en) Identity authentication method, system, business server and authentication server
CN104869043B (en) A kind of method and terminal for establishing VPN connection
CN108496380A (en) server, mobile terminal and program
CN107086984A (en) A kind of method, terminal and server for obtaining and generating identifying code
CN110099029A (en) A kind of auth method, terminal device and server
CN106921636A (en) Identity identifying method and device
CN110266642A (en) Identity identifying method and server, electronic equipment
CN105991600A (en) Identity authentication and apparatus, server and terminal
CN107872447A (en) Electronic device, server, communication system and communication method
CN107508822A (en) Access control method and device
CN105828454B (en) A kind of method, apparatus connecting network and a kind of WIFI routing device
CN109861968A (en) Resource access control method, device, computer equipment and storage medium
CN110365701A (en) The management method of customer terminal equipment, calculates equipment and storage medium at device
CN109218370A (en) Message method and device, electronic equipment
CN110099129A (en) A kind of data transmission method and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1258189

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant